Data Security and Confidentiality Sample Clauses

Data Security and Confidentiality. (1) Exhibit A - Data Security Requirements, outlines Vendor responsibility for data/document destruction.
AutoNDA by SimpleDocs
Data Security and Confidentiality. Grantees shall have staff complete CDPH required confidentiality and data security training, and maintain on file associated confidentiality agreements for each staff person with access to confidential public health records and data.
Data Security and Confidentiality. (1) Contractor agrees to abide by the provisions of the FBI Criminal Justice Information Services (CJIS) Security Policy that applies to Electronic Fingerprinting, specifically regarding criminal history background checks on Contractor’s employees and Contractors, as well as the prohibition on dissemination of any confidential information received by the Contractor.
Data Security and Confidentiality. ‌ An LEA may provide education records to the DOR for the performance of transition services but will do so only after the LEA has received the prior written consent of the parent or adult student with educational rights. The DOR shall: (i) keep all personally identifiable information contained in education records confidential; (ii) use education records solely for the purpose of performing this agreement; (iii) disclose education records solely to those employees with a need to know for the purpose of performing this agreement; and (iv) immediately return or confidentially destroy all education records per National Institute of Science and Technology (NIST) Special Publication (SP) 800-88 when no longer needed for the purposes for which it was disclosed. The DOR may provide consumer information to an LEA for the performance of transition services but will do so only after the DOR has received the prior written consent of the consumer. If the consumer is under the age of 18 and is not an emancipated minor, requires the written consent of the parent or guardian. The LEA shall: (i) keep all personally identifiable information contained in consumer records confidential; (ii) use consumer records solely for the purpose of performing this agreement; (iii) disclose consumer records solely to those employees with a need to know for the purpose of performing this agreement; and (iv) immediately destroy all consumer records when no longer needed for the purposes for which it was disclosed. Appropriate steps will be taken to protect confidential information of persons with disabilities, including:
Data Security and Confidentiality. A. NPRQI Program has contracted with Clario (formerly known as BioClinica) to host all confidential data, performance dashboard, and de-identified aggregate performance dashboards of Participant Organizations.
Data Security and Confidentiality. The Contractor will use at least the same degree of care as required by the Payment Card Industry (PCI), not inconsistent with standards and practices codified as ISO 27001 and 27002, to prevent disclosing to third parties the Confidential Information of State of Florida Eligible Users as it employs to avoid unauthorized disclosure, publication or dissemination of its own Confidential Information of like character, but in no event less than reasonable care.
Data Security and Confidentiality. Grantees shall comply with recommendations set forth in CDC’s “Data Security and Confidentiality Guidelines for HIV, Viral Hepatitis, Sexually Transmitted Disease, and Tuberculosis Programs.” xxxx://xxx.xxx.xxx/nchhstp/programintegration/docs/PCSIDataSecurityGuideline s.pdf. Grantees shall have staff complete CDPH required confidentiality and data security training, and maintain on file associated confidentiality agreements for each staff person with access to STD data.
AutoNDA by SimpleDocs
Data Security and Confidentiality. 2.1 IROL warrants and represents to CFD that the site is and throughout the term of this agreement will be a secure website with an SSL certification issued by Comodo, an independent Internet security certification company. Site hosting is provided through Microsoft’s Azure (xxxxx.xxxxxxxxx.xxx) on a dedicated IP address.
Data Security and Confidentiality. 3.1. The Data Processor shall implement appropriate technical and organisational measures to safeguard the Personal Data from unauthorised or unlawful processing or accidental loss, destruction or damage in compliance with best industry standards, having regard to the state of technological development and the cost of implementing any measures, such measures shall ensure a level of security appropriate to the harm that might result from unauthorised or unlawful processing or accidental loss, destruction or damage and to the nature of the Personal Data to be protected. Without limiting the foregoing, the Data Processor shall:
Data Security and Confidentiality. Data files submitted by the City will be stored on a secure server administered by DCHS. Data files will be processed and loaded into the main BHRD database, the Health and Human Services analytic workspace, and the Integrated Data Hub. These databases are secured according to federal Health Information Portability and Accountability Act (HIPAA) regulations. All users with access to these databases are required to complete HIPAA training and sign an oath of confidentiality. Access to the databases and secure server is restricted by password protection and folder permissions. Access to the data is limited to the King County Department of Information Technology (KCIT), DCHS staff and Public Health-Seattle & King County staff (hereafter referred to as “the County”) directly involved with processing the quarterly data file or conducting analyses and evaluating programs and initiatives described in Section IV.
Time is Money Join Law Insider Premium to draft better contracts faster.